Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 600-199 Exam - Cheat-Test.com

Free 600-199 Sample Questions:

Q: 1
In a network security policy, which procedure should be documented ahead of time to speed the communication of a network attack?
A. restoration plans for compromised systems
B. credentials for packet capture devices
C. Internet service provider contact information
D. risk analysis tool credentials
E. a method of communication and who to contact
Answer: E

Q: 2
Which data is the most useful to determine if a network attack was occurring from inbound Internet traffic?
A. syslogs from all core switches
B. NetfFow data from border firewall(s)
C. VPN connection logs
D. DNS request logs
E. Apache server logs
Answer: B

Q: 3
Which step should be taken first when a server on a network is compromised?
A. Refer to the company security policy.
B. Email all server administrators.
C. Determine which server has been compromised.
D. Find the serial number of the server.
Answer: A

Q: 4
After an attack has occurred, which two options should be collected to help remediate the problem? (Choose two.)
A. packet captures
B. NAT translation table
C. syslogs from affected devices
D. connection table information
E. NetFlow data
Answer: C,E

Q: 5
Which source should be used to recommend preventative measures against security vulnerabilities regardless of operating system or platform?
A. Microsoft security bulletins
B. Cisco PSIRT notices
C. Common Vulnerabilities and Exposure website
D. Mozilla Foundation security advisories
E. zero-day attack wiki
Answer: C

Q: 6
Which data from previous network attacks should be used to recommend architectural changes based on potential future impact?
A. SNMP statistics
B. known vulnerabilities
C. security audit reports
D. IPS signature logs
E. STP topology changes
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved